Title: CVE-2011-4969 (Medium) detected in jquery.1.4.4.nupkg · Issue #12 · ignatandrei/JavaScriptAndMVVMandMVC · GitHub
Open Graph Title: CVE-2011-4969 (Medium) detected in jquery.1.4.4.nupkg · Issue #12 · ignatandrei/JavaScriptAndMVVMandMVC
X Title: CVE-2011-4969 (Medium) detected in jquery.1.4.4.nupkg · Issue #12 · ignatandrei/JavaScriptAndMVVMandMVC
Description: CVE-2011-4969 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library home page: https://api.nuget.org/packag...
Open Graph Description: CVE-2011-4969 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library...
X Description: CVE-2011-4969 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library...
Opengraph URL: https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/issues/12
X: @github
Domain: patch-diff.githubusercontent.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"CVE-2011-4969 (Medium) detected in jquery.1.4.4.nupkg","articleBody":"## CVE-2011-4969 - Medium Severity Vulnerability\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20\u003e Vulnerable Library - \u003cb\u003ejquery.1.4.4.nupkg\u003c/b\u003e\u003c/p\u003e\u003c/summary\u003e\n\n\u003cp\u003ejQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand...\u003c/p\u003e\n\u003cp\u003eLibrary home page: \u003ca href=\"https://api.nuget.org/packages/jquery.1.4.4.nupkg\"\u003ehttps://api.nuget.org/packages/jquery.1.4.4.nupkg\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003ePath to dependency file: /tmp/ws-scm/JavaScriptAndMVVMandMVC/packages/jQuery.Validation.1.11.1/jQuery.Validation.1.11.1.nuspec\u003c/p\u003e\n\u003cp\u003ePath to vulnerable library: /JavaScriptAndMVVMandMVC/packages/jQuery.Validation.1.11.1/jQuery.Validation.1.11.1.nuspec\u003c/p\u003e\n\u003cp\u003e\n\nDependency Hierarchy:\n - :x: **jquery.1.4.4.nupkg** (Vulnerable Library)\n\u003cp\u003eFound in HEAD commit: \u003ca href=\"https://github.com/ignatandrei/JavaScriptAndMVVMandMVC/commit/f9885f517c6cbae93e178995ccc1763fbd601b93\"\u003ef9885f517c6cbae93e178995ccc1763fbd601b93\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20\u003e Vulnerability Details\u003c/summary\u003e\n\u003cp\u003e \n \nCross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using location.hash to select elements, allows remote attackers to inject arbitrary web script or HTML via a crafted tag.\n\n\u003cp\u003ePublish Date: 2013-03-08\n\u003cp\u003eURL: \u003ca href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4969\u003eCVE-2011-4969\u003c/a\u003e\u003c/p\u003e\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20\u003e CVSS 2 Score Details (\u003cb\u003e4.3\u003c/b\u003e)\u003c/summary\u003e\n\u003cp\u003e\n\nBase Score Metrics not available\u003c/p\u003e\n\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\u003cdetails\u003e\u003csummary\u003e\u003cimg src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20\u003e Suggested Fix\u003c/summary\u003e\n\u003cp\u003e\n\n\u003cp\u003eType: Upgrade version\u003c/p\u003e\n\u003cp\u003eOrigin: \u003ca href=\"https://nvd.nist.gov/vuln/detail/CVE-2011-4969\"\u003ehttps://nvd.nist.gov/vuln/detail/CVE-2011-4969\u003c/a\u003e\u003c/p\u003e\n\u003cp\u003eRelease Date: 2013-03-08\u003c/p\u003e\n\u003cp\u003eFix Resolution: 1.6.3\u003c/p\u003e\n\n\u003c/p\u003e\n\u003c/details\u003e\n\u003cp\u003e\u003c/p\u003e\n\n***\nStep up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)","author":{"url":"https://github.com/mend-bolt-for-github[bot]","@type":"Person","name":"mend-bolt-for-github[bot]"},"datePublished":"2019-11-01T18:48:24.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/12/JavaScriptAndMVVMandMVC/issues/12"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:bde96edb-d931-c3c4-69b4-13231e7cb5e2 |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | EDF0:11BDB2:1A39BC7:214C59F:6991B4E3 |
| html-safe-nonce | e86ea8efbd3889a4d1b2717c9dbb24360c9b044cdf26f7086a26c49655b16d77 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJFREYwOjExQkRCMjoxQTM5QkM3OjIxNEM1OUY6Njk5MUI0RTMiLCJ2aXNpdG9yX2lkIjoiNjk0NDk2NTE4MTcxNDgzODc1NSIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | b3309a26f541efe3284b84b84ee4c3af9a6e7114261898ba188d41c574bfb0ca |
| hovercard-subject-tag | issue:516287315 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/ignatandrei/JavaScriptAndMVVMandMVC/12/issue_layout |
| twitter:image | https://opengraph.githubassets.com/0864565e3061d2a0cd1ad2199f210bc3c6c83de0f1efe4330840eaa4a05a677b/ignatandrei/JavaScriptAndMVVMandMVC/issues/12 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/0864565e3061d2a0cd1ad2199f210bc3c6c83de0f1efe4330840eaa4a05a677b/ignatandrei/JavaScriptAndMVVMandMVC/issues/12 |
| og:image:alt | CVE-2011-4969 - Medium Severity Vulnerability Vulnerable Library - jquery.1.4.4.nupkg jQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event hand... Library... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | mend-bolt-for-github[bot] |
| hostname | github.com |
| expected-hostname | github.com |
| None | 42c603b9d642c4a9065a51770f75e5e27132fef0e858607f5c9cb7e422831a7b |
| turbo-cache-control | no-preview |
| go-import | github.com/ignatandrei/JavaScriptAndMVVMandMVC git https://github.com/ignatandrei/JavaScriptAndMVVMandMVC.git |
| octolytics-dimension-user_id | 153982 |
| octolytics-dimension-user_login | ignatandrei |
| octolytics-dimension-repository_id | 15478526 |
| octolytics-dimension-repository_nwo | ignatandrei/JavaScriptAndMVVMandMVC |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 15478526 |
| octolytics-dimension-repository_network_root_nwo | ignatandrei/JavaScriptAndMVVMandMVC |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 848bc6032dcc93a9a7301dcc3f379a72ba13b96e |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width